• Title/Summary/Keyword: anti-virus system

Search Result 99, Processing Time 0.03 seconds

Anti-HIV-1 Activity of Gelatin Hydrolysate Derived from Alaska Pollack Theragra chalcogramma Skin (명태(Theragra chalcogramma) 껍질 유래 젤라틴 가수분해물의 항 HIV-1 효능)

  • Park, Sun-Joo
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.49 no.5
    • /
    • pp.594-599
    • /
    • 2016
  • Infection with HIV (Human immunodeficiency virus), over time, develops into acquired immunodeficiency syndrome (AIDS). The development of non-toxic and effective anti-HIV drugs is one of the most promising strategies for the treatment of AIDS. In this study, we investigated the anti-HIV-1 activity of gelatin hydrolysates from Alaska pollack skin. Gelatin hydrolysates were prepared using four enzymes (alcalase, flavourzyme, neutrase, and pronase E). Among these, the pronase E gelatin hydrolysate was found to inhibit HIV-1 infection in the human T cell-line MT4. It exhibited inhibitory activity on HIV-1IIIB-induced cell lysis, reverse transcriptase activity, and viral p24 production at noncytotoxic concentrations. Moreover, it decreased the activation of matrix metalloproteinase-2 (MMP-2) in vitro. Because HIV infection-induced activation of MMP-2 can accelerate collagen resolution and collapse of the immune system, pronase E gelatin hydrolysate might prevent the activation of MMP-2 in cells, resulting in collagen stabilization and immune cell homeostasis consistent with anti-HIV activation. These results suggest that pronase E gelatin hydrolysate could potentially be incorporated into a novel therapeutic agent for HIV/AIDS patients.

Implementation of a security system using the MITM attack technique in reverse

  • Rim, Young Woo;Kwon, Jung Jang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.9-17
    • /
    • 2021
  • In this paper, we propose a reversely using the "Man In The Middle Attack" attack technique as a way to introduce network security without changing the physical structure and configuration of the existing network, a Virtual Network Overlay is formed with only a single Ethernet Interface. Implementing In-line mode to protect the network from external attacks, we propose an integrated control method through a micro network security sensor and cloud service. As a result of the experiment, it was possible to implement a logical In-line mode by forming a Virtual Network Overlay with only a single Ethernet Interface, and to implement Network IDS/IPS, Anti-Virus, Network Access Control, Firewall, etc.,. It was possible to perform integrated monitor and control in the service. The proposed system in this paper is helpful for small and medium-sized enterprises that expect high-performance network security at low cost, and can provide a network security environment with safety and reliability in the field of IoT and embedded systems.

Design and Implementation of Magnetic Stimulation Device Suitable for Herpes Zoster and Post Herpetic Neuralgia

  • Tack, Han-Ho;Kim, Gye-Sook;Kim, Whi-Young
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.10 no.2
    • /
    • pp.199-214
    • /
    • 2020
  • An important technique of the present invention is primarily to parallel light detection, self-pulse therapy after diagnosis. Herpes zoster is a disease caused by varicella zoster virus, and the virus that has been latent in the dorsal root ganglion that controls the skin segment loses its immune system and physically damages it. It is an acute skin disease in which acute pain and bullous rash occur along the sensory ganglia, which are rehab by inducers such as malignant tumors. Dorsal root ganglion after complete recovery of varicella, relapsed after incubation in brain ganglion, latent virus sometimes suppressed activity by cell mediated immunity, and in cell ganglion with reduced cellular immunity. It proliferates and destroys neurons, causing pain while forming a rash and blisters. This can reduce cell necrosis and increase the phagocytosis and enzymatic activity through the movement of ions through the cell membrane, depolarization and membrane potential change, growth factor secretion, calcium ion transfer, chondrocyte synthesis, etc., And may offer treatment options for lesions of herpes zoster and post-herpetic neuralgia (PHN).Therefore, according to the present research, the diagnosis and treatment device of treating paing for herpes zoster and post-herpetic pain can be implemented in the early stage of herpes zoster, and conventional analgesic regulation, anti-inflammatory effect, post-herpetic neuralgia.

A Study on New Treatment Way of a Malicious Code to Use a DLL Injection Technique (DLL injection 기법을 이용하는 악성코드의 새로운 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.251-258
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs, or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe, csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment wav that experimented on at these papers and a plan to solve will become a researcher of the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

Immunization with a soluble CD4-gp120 complex preferentially induces neutralizing anti-Human Immunodeficiency Virus Type lantibodies directed to conformation-dependent epitopes of gp120 (수용성 CD-gp120 결합체의 면역화로 유도된 항 gp120 항체의 특성에 관한 연구)

  • Kang, Chang-Yuil
    • Proceedings of the Korean Society of Applied Pharmacology
    • /
    • 1994.11a
    • /
    • pp.61-67
    • /
    • 1994
  • One fundamental problem in developing an AIDS vaccine is antigenic variation of HIV. Despite a substantial induced immune response in gp120-immunized monkeys and humans, high titers of V3-directed type specific neutralizing antibodies may not be sufficient to neutralize continuously emerging new isolates. Several studies analyzing anti-gp120 antibodies in HIV-infected individuals have clearly indicated that most broadly neutralizing antibodies are directed to conformation-dependent epitopes. Therefore, it seems important to evaluate the potential efficacy of candidate gp120 vaccines at inducing such antibodies, that might be potentially protective against multiple HIV strains. One concern in the development of any recombinant protein as a vaccine is its stability when mixed with an adjuvant. This could be a particularly important factor for recombinant gp120, given the conformational nature of its major, broadly neutralizing, epitopes. We hypothesized that gp120 complexed with recombinant CD4 could stabilize the conformation-dependent epitopes and effectively deliver these epitopes to the immune system. In this study, a soluble gp120-CD4 complex in Syntex Adjuvant Formulation was tested in mice to analyze the anti-gp120 antibody response. With the aim of defining the fine specificity and neutalizing activities of the immune response, 17Mabs were generated and characterized. The studies indicate that the gp120-CD4 complex elicits neutralizing anti-gp120 antibodies, most of which are directed to the conformation dependent epitopes.

  • PDF

Anti-Apoptosis Engineering Using a Gene of Bombyx mori

  • Kim, Eun-Jeong;Park, Tae-Hyeon
    • 한국생물공학회:학술대회논문집
    • /
    • 2002.04a
    • /
    • pp.62-65
    • /
    • 2002
  • We have previously shown that the addition of silkworm hemolymph to a culture medium increases the longevity of insect and mammalian cells by inhibiting apoptosis. This indicates that the component which inhibits apoptosis is contained in the silkworm hemolymph, The apoptosis-inhibiting component was isolated from silkwonn hemolymph and characterized in our previous study. A database search using the N-terminal amino acid sequence of this component as a template resulted in a 95% homology with a low molecular weight lipoprotein, the so called ’30K protein' of unknown function. In this study, the 30K protein gene was expressed in mammalian and insect cells to confirm the apoptosis-inhibiting effect. The overexpression of 30K protein in mammalian cell inhibited the staurosporin-induced apoptosis by the prevention of the activation of caspase 3. Using an Autographa californicanuclear polyhedrosis virus (AcNPV) system, the 30K protein was overexpressed also in insect cells. The expression of the 30K protein increased the longevity of baculovirus-infected insect cells by inhibiting apoptosis. These results suggest that the 30K protein is a novel anti-apoptotic protein.

  • PDF

Antimicrobial and Immunomodulatory Effects of Bifidobacterium Strains: A Review

  • Lim, Hyun Jung;Shin, Hea Soon
    • Journal of Microbiology and Biotechnology
    • /
    • v.30 no.12
    • /
    • pp.1793-1800
    • /
    • 2020
  • Bifidobacterium strains can provide several health benefits, such as antimicrobial and immunomodulatory effects. Some strains inhibit growth or cell adhesion of pathogenic bacteria, including multidrug-resistant bacteria, and their antibacterial activity can be intensified when combined with certain antibiotics. In addition, some strains of bifidobacteria reduce viral infectivity, leading to less epithelial damage of intestinal tissue, lowering the virus shedding titer, and controlling the release of antiviral substances. Furthermore, bifidobacteria can modulate the immune system by increasing immunoglobulins, and inducing or reducing pro- or anti-inflammatory cytokines, respectively. In particular, these anti-inflammatory effects are helpful in the treatment of patients who are already suffering from infection or inflammatory diseases. This review summarizes the antimicrobial effects and mechanisms, and immunomodulatory effects of Bifidobacterium strains, suggesting the potential of bifidobacteria as an alternative or complementary treatment option.

Anti-HIV-1 Viral Activity of Glycyrrhizin (감초탕(甘草湯)의 Human Immunodeficiency Virus-1 억제능(抑制能)에 관(關)한 연구(硏究))

  • Lee, Tae-kyun;Moon, Jun-Joon
    • The Journal of Dong Guk Oriental Medicine
    • /
    • v.1
    • /
    • pp.209-236
    • /
    • 1992
  • The microculture XTT antiviral assay method is used to quantitate HIV-1 induced cytopathic effects as modulated by test substances. This relatively simple assay facilitated the safe and rapid determination of in vitro antiviral activity of selected chemicals as well as direct cytotoxicity. This experiment also confirmed that this system measures infection and subsequent viral replication in target cells and XTT formazan formations correlated with the accumulation of extracellular virions, as measured by quantitative HIV-1 induced syncytium foramtion. The present results with Glycyrrhizin using this in vitro culture system demonstrated that effective dose, EC50(the concentration at which increases XTT formazan production in infected cultures to 50% of that in untreated, uninfected controls) was 250ml. As comparison, AZT was included in this experiment and demonstrated that EC50 AZT of was 0.05g/ml, approximately 5,000 times more potent than Glycyrrhizin based on EC50 ratio's alone. However, this potency is limited by severe cytotoxicity of AZT, while Glycyrrhizin is approximately 16 times less toxic(IC50 of Glycyrrhizin 800 and AZT 51 g/ml). While AZT's anti-HIV-1 viral activity is mediated by inhibition of reverse transcriptase of the virus, Glycyrrhizin faild to demonstrate any inhibitory activity against reverse transcriptase. Further study is necessary in order to understand the precise mechanisms of Glycyrrhizin action against HIV-1 viruses. Althouth Glycyrrhizin is less effective antiviral agent than AZT, much less toxicity of Glycyrrhizin is desirable in terms of chronic treatment. Combination treatment of AZT and Glycyrrhizin may be therapeutically beneficial. Clinical effectiveness of two drug combination therapy for AIDS patient is unknown at this time. However, this experimental investigation presents the scientific rational basis for such therapeutic approach.

  • PDF

The Detection System for Hosts infected Malware through Behavior information of NAC post-connect (NAC 의 post-connect에서 행위정보를 사용한 악성코드 감염 호스트 탐지 시스템)

  • Han, Myung-Mook;Sun, Jong-Hyun
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.6
    • /
    • pp.91-98
    • /
    • 2010
  • NAC(Network Access Control) has been developed as a solution for the security of end-point user, to be a target computer of worm attack which does not use security patch of OS and install Anti-Virus, which spreads the viruses in the Intra-net. Currently the NAC products in market have a sufficient technology of pre-connect, but insufficient one of post-connect which detects the threats after the connect through regular authentication. Therefore NAC users have been suffered from Zero-day attacks and malware infection. In this paper, to solve the problems in the post-connect step we generate the normal behavior profiles using the traffic information of each host, host information through agent, information of open port and network configuration modification through network scanner addition to authentication of host and inspection of policy violation used before. Based on these we propose the system to detect the hosts infected malware.

  • PDF

Malicious Codes Re-grouping Methods using Fuzzy Clustering based on Native API Frequency (Native API 빈도 기반의 퍼지 군집화를 이용한 악성코드 재그룹화 기법연구)

  • Kwon, O-Chul;Bae, Seong-Jae;Cho, Jae-Ik;Moon, Jung-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.115-127
    • /
    • 2008
  • The Native API is a system call which can only be accessed with the authentication of the administrator. It can be used to detect a variety of malicious codes which can only be executed with the administrator's authority. Therefore, much research is being done on detection methods using the characteristics of the Native API. Most of these researches are being done by using supervised learning methods of machine learning. However, the classification standards of Anti-Virus companies do not reflect the characteristics of the Native API. As a result the population data used in the supervised learning methods are not accurate. Therefore, more research is needed on the topic of classification standards using the Native API for detection. This paper proposes a method for re-grouping malicious codes using fuzzy clustering methods with the Native API standard. The accuracy of the proposed re-grouping method uses machine learning to compare detection rates with previous classifying methods for evaluation.